Performance analysis of IPSec protocol: encryption and authentication.
Omar S. ElkeelanyMustafa M. MatalgahKhurram SheikhM. ThakerGhulam M. ChaudhryDeepankar MedhiJihad QaddourPublished in: ICC (2002)
Keyphrases
- authentication protocol
- mutual authentication
- key exchange
- security analysis
- virtual private network
- key distribution
- secret key
- cryptographic protocols
- smart card
- symmetric key
- user authentication
- security protocols
- authentication scheme
- encryption scheme
- security properties
- public key
- elliptic curve cryptography
- image encryption
- password authentication
- lightweight
- privacy protection
- encryption decryption
- key exchange protocol
- security model
- secure communication
- key management
- diffie hellman
- high security
- rfid tags
- public key cryptography
- identity authentication
- trusted third party
- rfid systems
- modular exponentiation
- key agreement
- private key
- security requirements
- key agreement protocol
- cryptographic algorithms
- ciphertext
- group communication
- network management
- elliptic curve
- image authentication
- hash functions
- biometric authentication